Solved

SQL Anywhere security

Posted on 1997-11-13
1
281 Views
Last Modified: 2006-11-17
I am wondering if someone could point me to a document that would explain/define what, if any, security is implemented on a Watcom/SQL anywhere database that sits on a laptop.  I am specificly referring to when a person is not connected via LAN/DIAL-UP.  People have suggested that we implement a third party product to encrypt/secure the data.  I don't think this is necessary but I need some information to back this position up.  My thoughts are if you take away the standard logins (ie DBA/SQL) the casual thief would not be able to crack the data.  Any help/comments would be appreciated.

Thanks,

Kevin

0
Comment
Question by:mccax
1 Comment
 

Accepted Solution

by:
RONY earned 100 total points
ID: 1098073
You're totaly right, the security is stored IN the database. So you change the password of the standard DBA and you create new users and/or groups in your database to whom you can attribute rights for each table, SP, view,etc... if you want.
If you want you can additionaly to that encrypt your database, but you don't need a 3° party product for that. The dbinit utility with the command switch -e does that for you. Remark that encryption slows down performance of the DB
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Google always has something new and amazing up its sleeve, and the most current thing that they have been working on is another step in the evolution of Google Search, from machine learning to its brilliant successor, deep learning.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question